First published: Mon Mar 29 2021(Updated: )
In FreeBSD 12.2-STABLE before r368250, 11.4-STABLE before r368253, 12.2-RELEASE before p1, 12.1-RELEASE before p11 and 11.4-RELEASE before p5 rtsold(8) does not verify that the RDNSS option does not extend past the end of the received packet before processing its contents. While the kernel currently ignores such malformed packets, it passes them to userspace programs. Any programs expecting the kernel to do validation may be vulnerable to an overflow.
Credit: secteam@freebsd.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD FreeBSD | =11.4 | |
FreeBSD FreeBSD | =11.4-p1 | |
FreeBSD FreeBSD | =11.4-p2 | |
FreeBSD FreeBSD | =11.4-p3 | |
FreeBSD FreeBSD | =12.1 | |
FreeBSD FreeBSD | =12.1-p1 | |
FreeBSD FreeBSD | =12.1-p2 | |
FreeBSD FreeBSD | =12.1-p3 | |
FreeBSD FreeBSD | =12.1-p4 | |
FreeBSD FreeBSD | =12.1-p5 | |
FreeBSD FreeBSD | =12.1-p6 | |
FreeBSD FreeBSD | =12.1-p7 | |
FreeBSD FreeBSD | =12.1-p8 | |
FreeBSD FreeBSD | =12.1-p9 | |
FreeBSD FreeBSD | =12.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-25577 is a vulnerability in FreeBSD operating system versions 11.4 and 12.1 that allows an attacker to execute arbitrary code by exploiting a flaw in the rtsold(8) program.
CVE-2020-25577 has a severity score of 9.8 (critical) out of 10.
FreeBSD versions 11.4 and 12.1 are affected by CVE-2020-25577.
To fix CVE-2020-25577, it is recommended to update your FreeBSD system to the latest available patch or upgrade to a non-vulnerable version.
You can find more information about CVE-2020-25577 on the FreeBSD Security Advisories website and the NetApp security advisory.